A post about identifying key areas of Configuration Manager (SCCM) infrastructure that defenders can implement for deception solutions
Mapping Deception Solutions With BloodHound OpenGraph - Configuration Manager - SpecterOps
Deception and canary development implemented in SCCM can be used to alert upon cyber attacks and intrusions. This blog provides step by step guidance to implement deception solutions and use BloodHound OpenGraph for planning.
SpecterOps (specterops.io)